Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch7
{"title":"Business and Economics of Security","authors":"","doi":"10.1002/9781119653554.ch7","DOIUrl":"https://doi.org/10.1002/9781119653554.ch7","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch9
{"title":"Leaking, Hacking, Doxing, and Whistleblowing","authors":"","doi":"10.1002/9781119653554.ch9","DOIUrl":"https://doi.org/10.1002/9781119653554.ch9","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133897778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch8
{"title":"Human Aspects of Security","authors":"","doi":"10.1002/9781119653554.ch8","DOIUrl":"https://doi.org/10.1002/9781119653554.ch8","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch10
{"title":"Security, Policy, Liberty, and Law","authors":"","doi":"10.1002/9781119653554.ch10","DOIUrl":"https://doi.org/10.1002/9781119653554.ch10","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch4
G. L. Powell
SECURITY: Throughout my visits to different tribes within the last year, I have asked the question, who is going to take over and run the casino/resort when the elders are ready to retire? It is time to start training the youth, with the passion to learn, on what their elders have worked so hard to build. The youth should be slowly worked into the different areas of running a resort/casino through proper training and mentoring. The lack of teamwork between security and surveillance is industry wide. I feel this is often due to improper management. Since surveillance does not get involved physically on the casino property, security can be considered the enforcement arm of surveillance. This type of liaison must start with the department heads by training both departments on how and why teamwork is beneficial in increasing the protection of the property's assets and liabilities as well as opening up a communication flow. Subsequently, proper teamwork is essential in overall guest protection and liability claims. There is probably more money paid out in lawsuits than actual cheating losses.
{"title":"Security and Technology","authors":"G. L. Powell","doi":"10.1002/9781119653554.ch4","DOIUrl":"https://doi.org/10.1002/9781119653554.ch4","url":null,"abstract":"SECURITY: Throughout my visits to different tribes within the last year, I have asked the question, who is going to take over and run the casino/resort when the elders are ready to retire? It is time to start training the youth, with the passion to learn, on what their elders have worked so hard to build. The youth should be slowly worked into the different areas of running a resort/casino through proper training and mentoring. The lack of teamwork between security and surveillance is industry wide. I feel this is often due to improper management. Since surveillance does not get involved physically on the casino property, security can be considered the enforcement arm of surveillance. This type of liaison must start with the department heads by training both departments on how and why teamwork is beneficial in increasing the protection of the property's assets and liabilities as well as opening up a communication flow. Subsequently, proper teamwork is essential in overall guest protection and liability claims. There is probably more money paid out in lawsuits than actual cheating losses.","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch1
{"title":"Crime, Terrorism, Spying, and War","authors":"","doi":"10.1002/9781119653554.ch1","DOIUrl":"https://doi.org/10.1002/9781119653554.ch1","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1002/9781119653554.ch2
{"title":"Travel and Security","authors":"","doi":"10.1002/9781119653554.ch2","DOIUrl":"https://doi.org/10.1002/9781119653554.ch2","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133369402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-05DOI: 10.1002/9781119653554.ch3
S. LukeshSusan
{"title":"Internet of Things","authors":"S. LukeshSusan","doi":"10.1002/9781119653554.ch3","DOIUrl":"https://doi.org/10.1002/9781119653554.ch3","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-07DOI: 10.1002/9781119653554.ch6
L. Firth
{"title":"Privacy and Surveillance","authors":"L. Firth","doi":"10.1002/9781119653554.ch6","DOIUrl":"https://doi.org/10.1002/9781119653554.ch6","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121632955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-01-06DOI: 10.1002/9781119653554.ch5
H. Oakley
{"title":"Elections and Voting","authors":"H. Oakley","doi":"10.1002/9781119653554.ch5","DOIUrl":"https://doi.org/10.1002/9781119653554.ch5","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}